Digital ID

Pierluigi Paganini December 09, 2014
Take care of Recovery Key for Apple Two-step verification system to avoid permanently lock Apple account

If you lose your recovery key with two-step verification Apple can’t help you.By forgetting Recovery Key could completely lock a person out of their account More that one year ago Apple has introduced the two-step verification system to implement a two-factor authentication process and improve security for Apple IDs. Since March 2013 Apple has progressively extended […]

Pierluigi Paganini December 04, 2014
New Google API simplifies the reCAPTCHA experience

Google has simplified the authentication process by introducing an updated CAPTCHA that simply asks users whether they are a bot. Google’s new API simplifies the reCAPTCHA experience, product manager Vinay Shet said. Google has provided a significant update to its reCAPTCHA authentication system with the intent to simplify the process. The CAPTCHA is a type of […]

Pierluigi Paganini November 28, 2014
The Twitter App Graph feature will track users mobile apps for commercial purposes

Twitter announced app graph, it will now track every mobile app its users have Installed on their smartphones and tables.  Privacy advocates arise. Twitter announced the implementation of the “app graph” function that will allow the company to provide “more personal Twitter experience” by serving targeted advertisements by serving targeted advertisements. This means that also Twitter, like […]

Pierluigi Paganini November 20, 2014
Detekt is the free tool to detect state spyware on phones and PCs

Amnesty International launches Detekt tool to scan for state surveillance spyware on phones and PCs, it was developed by security expert Claudio Guarnieri. A group of security and technology experts that fight for the respect of human rights experts have launched a new tool dubbed Detekt that allow the detection of the government surveillance malware on […]

Pierluigi Paganini November 12, 2014
NHS Trusts fail to Extend Outdated Windows XP Security Support with Microsoft

Thousands of patient records in UK are vulnerable to cyber fraudsters after up to 20 trusts under the National Hospital Service failed to extend security support for outdated Windows XP with Microsoft. Trusts running on the outdated OS risks reversed engineered attacks from hackers exploiting vulnerabilities on the unsupported OS. Hundreds of Thousands of Patient […]

Pierluigi Paganini October 27, 2014
RRVS, Facebook and Yahoo work to prevent identity theft

Facebook and Yahoo have designed an SMTP extension dubbed RRVS, Require-Recipient-Valid-Since, to prevent illegal use of emails with a new  ownership. Last year Yahoo announced the decision to reset any account that has not been used for 12 months, making them available to other users. The decision has raised several doubts for security and privacy issues, […]

Pierluigi Paganini October 20, 2014
New releases of Tor Browser 4.0 and Tails 1.2 to preserve your privacy

New significant software updates Tor Browser 4.0 and Tails 1.2 are available for the popular Privacy Tools used to preserve online anonymity The Tor project has released a new version of the popular free software for enabling online anonymity Tor, Tor Browser 4.0 is the release Tor Browser Bundle available for download. The Tor Browser Bundle is based on an […]

Pierluigi Paganini October 03, 2014
JPMorgan – 76 million households and 7 million small businesses account exposed

The cyberattack that compromised systems at JPMorgan Chase exposed accounts of 76 million households and seven million small businesses. Data related nearly 76 million households and seven million small business accounts were exposed in the recent hack of the JPMorgan Chase & Co (JPM.N) systems occurred during the summer, making it one of the biggest data breaches in history. […]

Pierluigi Paganini September 29, 2014
SHA-1 has been deprecated, what can I do?

The SHA-1 cryptographic hash algorithm has been known vulnerable, Collision attacks against it are too affordable and attacks will get cheaper soon. Many websites today are using digital certificates signed using algorithms based on the hash algorithm called SHA-1. Hashing algorithms are used to ensure the integrity of the certificate in the signing processes, a flawed […]

Pierluigi Paganini September 07, 2014
EPPB tool copies usable to download victims’ data from iCloud backups

Copies of the Elcomsoft EPPB tool are circulating in the underground and could have been used in the recent leak of celebrity photos. Recently naked pictures of celebrities have been leaked online, but security experts were particularly interested to the news because they speculate that the images have been stolen from the Apple iCloud service. […]